Does Not Compute

 

Image result for picture overheating computers

 

Technology is a boon to our kind. It enables us to reach more people than ever before for the purpose of a quick squirt of fuel or as part of the orchestrated campaign to seduce our next victim who will be our primary source. The prevalence of social media platforms, blogs, chatrooms and the like provides us with a ready audience for us to declare our brilliance. Whether it is a pithy tweet, a photograph of our latest cycling adventure on Facebook, the culinary achievement that has been shared on Instagram, there are so many ways to herald our magnificence. We do not need to be near to these people. The reach is millions and therefore when we receive a praiseworthy comment, a like or love indication from the relevant button then that sudden dose of fuel comes our way. It is an almost instant hit. Fire something out across the electronic ether and in a matter of moments a reliable dose of fuel will come winging its way back. What a wonderful and simple method.

Even better is the use of our computers to search out targets, vet their online information to ascertain whether they would be suitable for our purposes and then to mine for information which can be used in the seduction of our targets. It is all there. The computer us used to find the information which forms the bedrock of our campaigns and it is also the instrument of our campaigns. So many repeated ways to bombard somebody with our supposed love. Our incessant application and monitoring. The ways in which we can keep in touch with different prospective victims as we assess who will be best. The way we can develop your replacement as we feel that your positive fuel is waning and your devaluation is just around the corner. The way we can triangulate you with a piece of machinery as our eyes remain locked on the screen as we engage in our online flirtations and gathering of fuel. The computer is truly our friend but it is also very useful for you to understand what you are dealing with.

Our use of the computer is a telling indicator of who you are dealing with. Whether it is a tablet, laptop, PC or mobile ‘phone (after all you are really carrying a small computer in your bag or pocket these days) you can expect to find similar secretive and furtive behaviour from our kind when it comes to the use of the computer to further our machinations. The computer is the nerve centre of our operations and as such it is something which we will guard. Accordingly, you should be aware of activity and behaviour such as: –

  1. Closing the computer down when you are nearby;
  2. Switching screens when you are nearby;
  3. Refusing to let you use the device;
  4. If you are able to use the device, we will not allow you to know the password and instead will enter it for you;
  5. If you are able to use the device, we will hover over you whilst you do so;
  6. If you are able to use the device you will find that the e-mail account is either locked or is empty, the search history is clear, there is no predictive search element in the search bar which may give away previous and frequent searches and documents are locked down.
  7. If you are given unfettered access to a computing device then it is highly likely that we use a different device for our dark works which you do not know about, otherwise there is no way that we will allow you to use such a device so freely. In this instance you need to have identified other red flags to indicate it is more than likely that you are engaging with a narcissist to raise the prospect of us using two computers. If there are no other red flags your unfettered access to the computer will purely be as a consequence of the use having nothing to hide and he or she will not use a secret device.

You would do well to consider the computing habits of the person that you are with and especially so if you have suspicions that you are dealing with one of our kind. Understand that the computer (in its various forms) forms the platform for so much of what we do. Gathering new victims and seducing them, organising and executing your devaluation, orchestrating the smear campaign against you. You should know that the computer is a tool which is used against you and you can utilise it as a barometer of our attitude towards you which will then in turn allow you to understand what you can expect to happen.

So much of what we do occurs through the electronic medium because that allows us full reign to portraying what we wish to portray to the world at large. It allows significant access, it provides a platform for heralding our achievements and it is not an exaggeration to state that it forms the engine room of our activities.

We will never allow you access to our computers but if there is a shared device then you should look out for two things. The first is that after we have used it, our e-mail inbox, browsing history and messaging will be cleaner than a contagious diseases research lab. This situation will persist for some time. The second is that when there is something to read in that inbox, from that browsing history and those messages you ought to know that we wanted you to see it because your devaluation has begun and this is the electronic bait that has been set to provoke you. Bear in mind, this is just what we are prepared for you to see for the purposes of gathering fuel. What is really going on our devices that we will not allow you access to (and the ones you do not even know about) is far, far worse.

0
Advertisements

25 thoughts on “Does Not Compute”

  1. HG – This friend of mine (I call him Case Study #17) does not have any numbers programmed on his mobile phone. He states there is no need to program any telephone numbers on his phone which we have all found extremely odd here on our end. Have you seen this tactic before? It is the strangest thing I have ever seen but was the first red banner as to the possible nefarious life he had behind the scenes.

    0
  2. This is when I first knew he was cheating

    ME “Hey babe my phone is dead let me order pizza on yours .”

    Him “Use the computer”

    I cried myself to sleep that night when I should have just kicked his ass and left him . I hacked his accounts days later and sure enough he met someone else .

    0
  3. HG,

    A person can be useful as a source of fuel, however, people as a group are fickle. When using the net for fuel, how does this fickle herd affect your navigation? Do you get injured using this media?

    What would be the easiest way to blow a narcissists cover online?

    0
    1. It is all about the targeting and ensuring that the people we go for online will be responsive to what we need. Wounding can happen but because it is remote rather than proximate, the effect is not as great.
      In terms of blowing a narcissist’s cover you online, if you mean cause him to show his true colours, then ignore him. If he pesters and pesters then you have a redflag, Nunja.

      0
  4. What is with some of them being madly obsessive about posting on social media or self-expression? Constant obsession with clothes, wisdom quotes,… I am wondering if the shaking, constant searching for an “identity”, sense of humour, image-conjuring is a common narc trait of perhaps somatic? My boyfriends like that were not sure what to do all of the time.

    0
    1. Social media is an ideal conduit for the garnering of fuel and also traits to acquire for our construct, thus it is heavily used by all cadres of narcissist,tweaked to the relevant class traits.

      0
  5. Exactly this . It would’ve been easier trying to break into Fort Knox than to get anywhere near his devices let alone the passwords .. !

    He met & seduced his new target online giving her the Golden Period while he went on a full scale smear campaign with me. Used it to stalk, harass, threaten, triangulate, hoover & gather fuel without ever leaving the comfort of his study. On reflection it was so obvious, why didn’t I see it 🙁

    0
    1. There is no blinder man or woman, than the one who chooses to not see what is before them. There should never be a reason they don’t let you know their passwords or are so attached to their devices. I know my husbands – never have needed to use it. My exhusband, different story. We were married for 15 years. I think he cheated on and off but technology is was not that advanced as it is today and was very good at covering tracks. The one time I checked his phone (yes only one time) – my best friend told me she thought something was going on with him. I think she saw him with the other woman somewhere and didn’t want to be the one to tell me. She insisted I look through his phone and after he fell asleep on 6/30/08 I did in fact look. He had received a text message (number was not programmed) – or simply said – I’m available tomorrow from 4-7 pm. I called the number back and a woman answered. I woke him up after I reverse phone searched the number and found she was married with 4 children – expecting her 5th – with what turned out to be my exhusbands child. He was a Lesser Narc and got messy I guess. I asked him to leave 7/1/08. Divorce took a year. I met my current husband at almost the year mark and have been happily married to a transparently good and honest man.

      0
      1. Thanks for replying to my comment TDLL .

        I wasn’t blinded though I don’t think . It was more I was controlled & conditioned not to ask, the irony being that he had remote access & key loggers on the laptop he gave me . I knew that if I caused conflict & made him angry what the end result would be .

        I’m glad you had a happy ending . 🙂

        SSx

        0
  6. Yep, same ol story.

    Addicted to devices, fb; even dissing his friends As well with such behavior at their New Year’s Eve party.

    such bad treatment of other human beings!

    There are people with actual hearts out there, that’s what I look for ♡

    they won’t mask it in the technology nonsense

    0
  7. My work is in technology. If I wanted to, I could have hacked through all his devices and get the information I need. I never did. I didn’t want to know. The pain of dealing with reality was far greater than keeping myself in an ignorant state. Our intuition works much better than any form of technology. He however was ridiculously paranoid of my skills and told me he had changed the passwords of all his accounts, including his financials. I had to laugh at such silliness. It was insulting yet at the same time a compliment to my abilities.

    0
      1. Lol Lola. I didn’t want to be that. I wanted to be his partner, his companion, his love. But as Mr. Tudor says, we are their competition.

        0
  8. Hoover attempted today via computer. I’ve been NC since 7/4 and non responsive except once 9/4 to send gate card back and I was legally threatening if he continues to contact me. I’ve made myself less interesting and potentially wounding (got my claws). I didn’t respond to lieutenants. I didn’t respond to texts during funeral. Who does this??Now I get a friend request. Of course hes blocked and my profile is private for many reasons, I don’t have my pic online. His profile is wide open…so I can see new friends. ***rolls eyes***I’m being stalked. Just had to share. It hits me emotionally, though less each time.
    I didn’t want to believe you, HG, about the life contract. I thought, nahhhhh…now feeling like you are more correct about this than I gave you credit for…I still hope he’ll disappear. But, how long til then?

    0
    1. Thanks for the update Indy and naturally you would not want me to be right about this situation because of the ongoing impact that it has. The situation is ongoing in accordance with the Hoover Trigger and the Hoover Execution Criteria being met. If you maintain a no fuel provision he will go elsewhere presently.

      0
      1. Well, nothing since that attempt on 11/4. Feeling safe again since I have not heard from him. Nothing on Thanksgiving, surprised and glad. Perhaps he finally has another source. Denial for possible further hoovers creeps in fast, huh?

        0
      2. The problem with buying camouflage gear Indy is spotting it in the first place. When I was at university, I had a friend who often wore camouflage pants. Everytime he entered the room I would shout,
        “Chris, I cannot see your legs.”
        He looked every time.
        Then again he did end up with a lower second.

        0
  9. Computers and all devices, very expessive lesson.
    He convenced me to change to an Iphone, we went and bought a new lap top to. I trusted him and let him set it all up. Downloaded music on my phone etc. I watched him while making dinner, remember it like yesterday he was like a kid let loose in a toy store to buy all he wanted.
    Afterwards I couldnt get near his, and when I did he would sign me in then make sure I saw he deleted whatever I was doing.
    Left alot of questions, now I have the answers.

    0
  10. It makes me sad to see how they take advantage of people’s kindness. You can always take your power back. No one can take your power without your consent. Render them powerless. Remove yourself from the equation and let them walk through life empty and preying on other victims. HG is of great help to all who are enduring or have endured this torture.

    Don’t be hard on yourself for being kind or being good hearted. Emotional abuse and verbal abuse is far worse than physical. Control and consequences. Evil acts.

    0
  11. Mine is like a facebook or social media stalker. He never chat’s or types. He just looks and reads. I always found that kinda eery. I’ve looked over his shoulder to find him looking at Asian girls just scrolling up but never talking to any of them. However, there was this one time I walked in and he quickly closed something down. He thinks I stupid, but I’m not and even if I called him on it, he’d make up a lie so quick. Like I’m stupid or something.

    0

Leave a Reply